Analysis

  • max time kernel
    150s
  • max time network
    179s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    18-06-2021 07:10

General

  • Target

    594372006ab7dae5cb292b0768d424ed.exe

  • Size

    295KB

  • MD5

    594372006ab7dae5cb292b0768d424ed

  • SHA1

    a6108c2205f17925471d7bbfac9dbb3558b6e7e2

  • SHA256

    653d4491de7461361a379e7ed09e172c06d669d25fed55f134a1b278827f2efe

  • SHA512

    a78759d4a778f97ea03586244d46373ace726f6267b7f38de46061737752a1d484794cad59c5c5fcbd2491061a3deda49cff75e0b4735c6ef81f0c4b1ed1c89e

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://999080321newfolder1002002131-service1002.space/

http://999080321newfolder1002002231-service1002.space/

http://999080321newfolder3100231-service1002.space/

http://999080321newfolder1002002431-service1002.space/

http://999080321newfolder1002002531-service1002.space/

http://999080321newfolder33417-012425999080321.space/

http://999080321test125831-service10020125999080321.space/

http://999080321test136831-service10020125999080321.space/

http://999080321test147831-service10020125999080321.space/

http://999080321test146831-service10020125999080321.space/

http://999080321test134831-service10020125999080321.space/

http://999080321est213531-service1002012425999080321.ru/

http://999080321yes1t3481-service10020125999080321.ru/

http://999080321test13561-service10020125999080321.su/

http://999080321test14781-service10020125999080321.info/

http://999080321test13461-service10020125999080321.net/

http://999080321test15671-service10020125999080321.tech/

http://999080321test12671-service10020125999080321.online/

http://999080321utest1341-service10020125999080321.ru/

http://999080321uest71-service100201dom25999080321.ru/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Botnet

50f8ded12c46443e43915127b1219ac2fc439bb6

Attributes
  • url4cnc

    https://tttttt.me/mimimimaxormin

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

39.3

Botnet

931

C2

https://bandakere.tumblr.com

Attributes
  • profile_id

    931

Signatures

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Tofsee

    Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 8 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Sets service image path in registry 2 TTPs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 15 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\594372006ab7dae5cb292b0768d424ed.exe
    "C:\Users\Admin\AppData\Local\Temp\594372006ab7dae5cb292b0768d424ed.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\594372006ab7dae5cb292b0768d424ed.exe
      "C:\Users\Admin\AppData\Local\Temp\594372006ab7dae5cb292b0768d424ed.exe"
      2⤵
      • Loads dropped DLL
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1628
  • C:\Users\Admin\AppData\Local\Temp\643F.exe
    C:\Users\Admin\AppData\Local\Temp\643F.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:784
  • C:\Users\Admin\AppData\Local\Temp\6DF0.exe
    C:\Users\Admin\AppData\Local\Temp\6DF0.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:932
  • C:\Users\Admin\AppData\Local\Temp\7532.exe
    C:\Users\Admin\AppData\Local\Temp\7532.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\unculdht\
      2⤵
        PID:852
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\hwaeuhyy.exe" C:\Windows\SysWOW64\unculdht\
        2⤵
          PID:1032
        • C:\Windows\SysWOW64\sc.exe
          "C:\Windows\System32\sc.exe" create unculdht binPath= "C:\Windows\SysWOW64\unculdht\hwaeuhyy.exe /d\"C:\Users\Admin\AppData\Local\Temp\7532.exe\"" type= own start= auto DisplayName= "wifi support"
          2⤵
            PID:924
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description unculdht "wifi internet conection"
            2⤵
              PID:368
            • C:\Windows\SysWOW64\sc.exe
              "C:\Windows\System32\sc.exe" start unculdht
              2⤵
                PID:1256
              • C:\Windows\SysWOW64\netsh.exe
                "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
                2⤵
                  PID:1536
              • C:\Users\Admin\AppData\Local\Temp\7C35.exe
                C:\Users\Admin\AppData\Local\Temp\7C35.exe
                1⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:1924
              • C:\Windows\SysWOW64\unculdht\hwaeuhyy.exe
                C:\Windows\SysWOW64\unculdht\hwaeuhyy.exe /d"C:\Users\Admin\AppData\Local\Temp\7532.exe"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:956
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  PID:1572
              • C:\Users\Admin\AppData\Local\Temp\94D4.exe
                C:\Users\Admin\AppData\Local\Temp\94D4.exe
                1⤵
                • Executes dropped EXE
                PID:1624
              • C:\Users\Admin\AppData\Local\Temp\A643.exe
                C:\Users\Admin\AppData\Local\Temp\A643.exe
                1⤵
                • Executes dropped EXE
                PID:1596
              • C:\Users\Admin\AppData\Local\Temp\AF77.exe
                C:\Users\Admin\AppData\Local\Temp\AF77.exe
                1⤵
                • Executes dropped EXE
                PID:1312
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                1⤵
                  PID:1900
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe
                  1⤵
                    PID:1720
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:680
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:1480
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:1356
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:924
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:1104

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Persistence

                            New Service

                            1
                            T1050

                            Modify Existing Service

                            1
                            T1031

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Privilege Escalation

                            New Service

                            1
                            T1050

                            Defense Evasion

                            Modify Registry

                            2
                            T1112

                            Install Root Certificate

                            1
                            T1130

                            Discovery

                            System Information Discovery

                            2
                            T1082

                            Query Registry

                            1
                            T1012

                            Peripheral Device Discovery

                            1
                            T1120

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\643F.exe
                              MD5

                              a69e12607d01237460808fa1709e5e86

                              SHA1

                              4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                              SHA256

                              188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                              SHA512

                              7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                            • C:\Users\Admin\AppData\Local\Temp\6DF0.exe
                              MD5

                              a69e12607d01237460808fa1709e5e86

                              SHA1

                              4a12f82aee1c90e70cdf6be863ce1a749c8ae411

                              SHA256

                              188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc

                              SHA512

                              7533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284

                            • C:\Users\Admin\AppData\Local\Temp\7532.exe
                              MD5

                              e980e3eaca8b32ab741a9483804a65aa

                              SHA1

                              49d97cad18acbf0678d97c39364292ef3ed01487

                              SHA256

                              9f8c6e33b172b30a5c94af7b30df429f87ec7c0cffb7f6b91afcba0210f6d58a

                              SHA512

                              3bca03123e6f760388c132339960c0137abf2af3fe12d14e2d98f62b83ab9f91a8ca21f23db9df3c6f7596ecaad3fef8fcebd8a36d7a16b312adf73b053b5caf

                            • C:\Users\Admin\AppData\Local\Temp\7532.exe
                              MD5

                              e980e3eaca8b32ab741a9483804a65aa

                              SHA1

                              49d97cad18acbf0678d97c39364292ef3ed01487

                              SHA256

                              9f8c6e33b172b30a5c94af7b30df429f87ec7c0cffb7f6b91afcba0210f6d58a

                              SHA512

                              3bca03123e6f760388c132339960c0137abf2af3fe12d14e2d98f62b83ab9f91a8ca21f23db9df3c6f7596ecaad3fef8fcebd8a36d7a16b312adf73b053b5caf

                            • C:\Users\Admin\AppData\Local\Temp\7C35.exe
                              MD5

                              6652b49881dceedae99850f00639bff0

                              SHA1

                              0102a452d1e01e0cdd71a3abba5d5466b2a80505

                              SHA256

                              4415d0e588b7e01d745639afe4bf853e25bc6568dd1bfdc543e617380bd4b084

                              SHA512

                              c0bd47b68eb9e70aefad40c7a7e959aca67eecbf8537a78377f41704e135a9ffbfcec54e6e742572f8295598f2b7c511437b83204f864b18ff6cd9ce191fb35c

                            • C:\Users\Admin\AppData\Local\Temp\94D4.exe
                              MD5

                              572103ac4cecdf96fd25de9283680e82

                              SHA1

                              41f242adb6ba1c48bc1291410f40cdcae2ac2416

                              SHA256

                              4d7c54a3e59b356344a5880219532b00bae8b417a08423833cc92bb5410d4db1

                              SHA512

                              1aad5627b8ee2fce8f2d79778fb3b006d2a5d56fbae78bda65c00920512592371ca0dae91feb3ebe5a7035e73361633a00352f930ff1f340100e9da3c072dca2

                            • C:\Users\Admin\AppData\Local\Temp\A643.exe
                              MD5

                              572103ac4cecdf96fd25de9283680e82

                              SHA1

                              41f242adb6ba1c48bc1291410f40cdcae2ac2416

                              SHA256

                              4d7c54a3e59b356344a5880219532b00bae8b417a08423833cc92bb5410d4db1

                              SHA512

                              1aad5627b8ee2fce8f2d79778fb3b006d2a5d56fbae78bda65c00920512592371ca0dae91feb3ebe5a7035e73361633a00352f930ff1f340100e9da3c072dca2

                            • C:\Users\Admin\AppData\Local\Temp\AF77.exe
                              MD5

                              1aa964412e87da4656fde033a1719d3c

                              SHA1

                              e3a611781e830b06111fe82fd7c38125847ff243

                              SHA256

                              3bb3eb2e485c893ccd298f5a0813dcf57de87225c1688923bf928f5177cbbae1

                              SHA512

                              00e746d78975ba77051c9185b58179e8c4dcd27a0f147e0cf808591ce0122e99e64203bfdc9ca29efef87506d597c9564e4aad5a119ff65adf0ddd64e0ed2f79

                            • C:\Users\Admin\AppData\Local\Temp\hwaeuhyy.exe
                              MD5

                              d3854ae286011d87b301049352a2d493

                              SHA1

                              474b13f685c100ddbd870feaf3769d96d7532fa6

                              SHA256

                              948aa163bc4628856350a1e18d7698ed86ae0c00bcbd099f3994c0b943a30dab

                              SHA512

                              86d39ad9dc545bb0d82c553545239acd39e862dab0c2cb2fc33f910f82017e711139dcb4b51dc80f6a75185126e6dd28cf7c1549988c3d58676711be34d8a1c2

                            • C:\Windows\SysWOW64\unculdht\hwaeuhyy.exe
                              MD5

                              d3854ae286011d87b301049352a2d493

                              SHA1

                              474b13f685c100ddbd870feaf3769d96d7532fa6

                              SHA256

                              948aa163bc4628856350a1e18d7698ed86ae0c00bcbd099f3994c0b943a30dab

                              SHA512

                              86d39ad9dc545bb0d82c553545239acd39e862dab0c2cb2fc33f910f82017e711139dcb4b51dc80f6a75185126e6dd28cf7c1549988c3d58676711be34d8a1c2

                            • \Users\Admin\AppData\Local\Temp\AE30.tmp
                              MD5

                              d124f55b9393c976963407dff51ffa79

                              SHA1

                              2c7bbedd79791bfb866898c85b504186db610b5d

                              SHA256

                              ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                              SHA512

                              278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                            • memory/368-90-0x0000000000000000-mapping.dmp
                            • memory/568-84-0x0000000000400000-0x00000000008EA000-memory.dmp
                              Filesize

                              4.9MB

                            • memory/568-82-0x0000000000220000-0x0000000000233000-memory.dmp
                              Filesize

                              76KB

                            • memory/568-75-0x0000000000000000-mapping.dmp
                            • memory/680-126-0x0000000000080000-0x000000000008B000-memory.dmp
                              Filesize

                              44KB

                            • memory/680-124-0x0000000074BD1000-0x0000000074BD3000-memory.dmp
                              Filesize

                              8KB

                            • memory/680-122-0x0000000000000000-mapping.dmp
                            • memory/680-125-0x0000000000090000-0x0000000000097000-memory.dmp
                              Filesize

                              28KB

                            • memory/784-67-0x0000000000000000-mapping.dmp
                            • memory/852-81-0x0000000000000000-mapping.dmp
                            • memory/924-86-0x0000000000000000-mapping.dmp
                            • memory/924-138-0x0000000000000000-mapping.dmp
                            • memory/924-139-0x0000000000070000-0x0000000000076000-memory.dmp
                              Filesize

                              24KB

                            • memory/924-140-0x0000000000060000-0x000000000006C000-memory.dmp
                              Filesize

                              48KB

                            • memory/932-71-0x0000000000000000-mapping.dmp
                            • memory/956-102-0x0000000000400000-0x00000000008EA000-memory.dmp
                              Filesize

                              4.9MB

                            • memory/1032-83-0x0000000000000000-mapping.dmp
                            • memory/1104-141-0x0000000000000000-mapping.dmp
                            • memory/1240-66-0x0000000002AB0000-0x0000000002AC7000-memory.dmp
                              Filesize

                              92KB

                            • memory/1256-91-0x0000000000000000-mapping.dmp
                            • memory/1312-108-0x0000000000000000-mapping.dmp
                            • memory/1312-132-0x0000000000400000-0x000000000093F000-memory.dmp
                              Filesize

                              5.2MB

                            • memory/1312-131-0x0000000000940000-0x00000000009D7000-memory.dmp
                              Filesize

                              604KB

                            • memory/1356-136-0x00000000000D0000-0x00000000000D5000-memory.dmp
                              Filesize

                              20KB

                            • memory/1356-133-0x0000000000000000-mapping.dmp
                            • memory/1356-137-0x0000000000080000-0x0000000000089000-memory.dmp
                              Filesize

                              36KB

                            • memory/1480-129-0x0000000000070000-0x0000000000079000-memory.dmp
                              Filesize

                              36KB

                            • memory/1480-130-0x0000000000060000-0x000000000006F000-memory.dmp
                              Filesize

                              60KB

                            • memory/1480-127-0x0000000000000000-mapping.dmp
                            • memory/1536-95-0x0000000000000000-mapping.dmp
                            • memory/1572-106-0x00000000000C9A6B-mapping.dmp
                            • memory/1572-105-0x00000000000C0000-0x00000000000D5000-memory.dmp
                              Filesize

                              84KB

                            • memory/1596-96-0x0000000000000000-mapping.dmp
                            • memory/1596-117-0x0000000000400000-0x000000000092C000-memory.dmp
                              Filesize

                              5.2MB

                            • memory/1624-93-0x0000000000000000-mapping.dmp
                            • memory/1624-103-0x0000000000400000-0x000000000092C000-memory.dmp
                              Filesize

                              5.2MB

                            • memory/1624-104-0x0000000000340000-0x00000000003D1000-memory.dmp
                              Filesize

                              580KB

                            • memory/1628-60-0x0000000000400000-0x000000000040C000-memory.dmp
                              Filesize

                              48KB

                            • memory/1628-62-0x0000000076E11000-0x0000000076E13000-memory.dmp
                              Filesize

                              8KB

                            • memory/1628-61-0x0000000000402F68-mapping.dmp
                            • memory/1656-64-0x00000000003A0000-0x00000000003AC000-memory.dmp
                              Filesize

                              48KB

                            • memory/1720-116-0x0000000000070000-0x0000000000077000-memory.dmp
                              Filesize

                              28KB

                            • memory/1720-113-0x0000000000000000-mapping.dmp
                            • memory/1720-118-0x0000000000060000-0x000000000006C000-memory.dmp
                              Filesize

                              48KB

                            • memory/1900-111-0x0000000000000000-mapping.dmp
                            • memory/1900-114-0x00000000753D1000-0x00000000753D3000-memory.dmp
                              Filesize

                              8KB

                            • memory/1900-120-0x0000000000080000-0x00000000000EB000-memory.dmp
                              Filesize

                              428KB

                            • memory/1900-119-0x0000000000190000-0x0000000000204000-memory.dmp
                              Filesize

                              464KB

                            • memory/1924-89-0x0000000000400000-0x000000000092C000-memory.dmp
                              Filesize

                              5.2MB

                            • memory/1924-77-0x0000000000000000-mapping.dmp
                            • memory/1924-88-0x0000000000220000-0x00000000002B1000-memory.dmp
                              Filesize

                              580KB